Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
535deefc0c2866703f5a24782aa5b090.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
535deefc0c2866703f5a24782aa5b090.exe
Resource
win10v2004-20231215-en
General
-
Target
535deefc0c2866703f5a24782aa5b090.exe
-
Size
882KB
-
MD5
535deefc0c2866703f5a24782aa5b090
-
SHA1
1065b8088c3c0a21a7b45c32b1f3b27705e17d40
-
SHA256
be7f48bc769105639774263b5a730b3960eac5fac8ba019d19a06aca81ebb946
-
SHA512
f36fac63b6ee1080eb88daf0ad3ffee9a1bb3a1b4afa02e96455b3dbd2aa8fbf7eb32055e477043a7a0363ec14ac3b43ea40260ed91afbff456894680670b5ac
-
SSDEEP
12288:QUBDMmZriMmjwc+/aOU2xglqHo9a6NWPXjPb9jgTBvY9GhOEGUAV38I:IyrY565glqI46NWPjqBvzOcAm
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
%plDEKz1
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3356 set thread context of 3340 3356 535deefc0c2866703f5a24782aa5b090.exe 96 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3340 535deefc0c2866703f5a24782aa5b090.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3356 wrote to memory of 3340 3356 535deefc0c2866703f5a24782aa5b090.exe 96 PID 3356 wrote to memory of 3340 3356 535deefc0c2866703f5a24782aa5b090.exe 96 PID 3356 wrote to memory of 3340 3356 535deefc0c2866703f5a24782aa5b090.exe 96 PID 3356 wrote to memory of 3340 3356 535deefc0c2866703f5a24782aa5b090.exe 96 PID 3356 wrote to memory of 3340 3356 535deefc0c2866703f5a24782aa5b090.exe 96 PID 3356 wrote to memory of 3340 3356 535deefc0c2866703f5a24782aa5b090.exe 96 PID 3356 wrote to memory of 3340 3356 535deefc0c2866703f5a24782aa5b090.exe 96 PID 3356 wrote to memory of 3340 3356 535deefc0c2866703f5a24782aa5b090.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\535deefc0c2866703f5a24782aa5b090.exe"C:\Users\Admin\AppData\Local\Temp\535deefc0c2866703f5a24782aa5b090.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\535deefc0c2866703f5a24782aa5b090.exe"C:\Users\Admin\AppData\Local\Temp\535deefc0c2866703f5a24782aa5b090.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3340
-